Skip to main content

Part of the book series: In-Memory Data Management Research ((IMDM))

  • 618 Accesses

Abstract

The following chapter presents findings on selected related work and places my work in the corresponding context. There are two categories of related work with relevance to my work that are considered in this chapter

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. V.C. Hu, D.F. Ferraiolo, D.R. Kuhn, Assessment of Access Control Systems. Interagency Report 7316, National Institute of Standards and Technology (2006)

    Google Scholar 

  2. D.F. Ferraiolo, D.R. Kuhn, Role-based access control, in Proceedings of the 15th NIST National Computer Security Conference (1992), pp. 554–563

    Google Scholar 

  3. A.S. Sodiya, A.S. Onashoga, Components-based access control architecture. Issues Inf. Sci. Inf. Technol. 6, 699–706 (2009)

    Google Scholar 

  4. OASIS Open. eXtensible Access Control Markup Language (XACML) V.2.0, Feb 2005

    Google Scholar 

  5. J. Clark, XSL Transformations (XSLT) (1999), http://www.w3.org/TR/xslt. Accessed 8 Mar 2012

  6. E. Grummt, M. Schöffel, Verteilte Autorisation in RFID-Ereignissystemen, in D.A.CH Security: Bestandsaufnahme, Konzepte, Anwendungen, Perspektiven, ed. by P. Horster (Berlin, 2008) pp. 337–345

    Google Scholar 

  7. ODRL Initiative: ODRL V2.0 - XML encoding (2010), http://odrl.net/2.0/WD-ODRL-XML.html. Accessed 8 Mar 2012

  8. Global Standards 1: GS1 standards knowledge centre (2011), http://www.gs1.org/gsmp/kc/epcglobal/. Accessed 8 Mar 2012

  9. International Organization for Standardization, ISO/IEC 18000: Information Technology— Radio Frequency Identification for Item Management, 2004–2010

    Google Scholar 

  10. International Telecommunication Union, ST61 Agreement (2011), http://www.itu.int/ITU-R/terrestrial/broadcast/plans/st61/index.html. Accessed 8 Mar 2012

  11. A. Selian, 3G mobile licensing policy: from GSM to IMT-2000—a comparative analysis technical report, International Telecommunication Union (2001)

    Google Scholar 

  12. E.C. Jones, C.A. Chung, RFID in Logistics: A Practical Introduction (CRC Press, Boca Raton, 2007)

    Google Scholar 

  13. K. Finkenzeller, RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-Field Communication, 2nd edn. (Wiley, New York, 2010)

    Book  Google Scholar 

  14. M. Roberti, The history of RFID technology. RFID J. 1–3 (2008)

    Google Scholar 

  15. Heydt-Benjamin et al., Vulnerabilities in first-generation RFID-enabled credit cards, in Financial Cryptography and Data Security, volume 4886 of Lecture Notes in Computer Science, ed. by S. Dietrich, R. Dhamija (Springer, Berlin, 2007), pp. 2–14

    Google Scholar 

  16. Global standards 1: EPCglobal object name service 1.0.1 (2008), http://www.gs1.org/gsmp/kc/epcglobal/ons/ons_1_0_1-standard-20080529.pdf. Accessed 8 Mar 2012

  17. Global Standards 1: EPCIS standard 1.0.1 (2007), http://www.gs1.org/gsmp/kc/epcglobal/epcis/epcis_1_0_1-standard-20070921.pdf. Accessed 8 Mar 2012

  18. Global Standards 1: discovery services standard (in development) (2011), http://www.gs1.org/gsmp/kc/epcglobal/discovery. Accessed 8 Mar 2012

  19. J. Müller, An in-memory discovery service to retrieve track & trace information in a unique identifier network with hierarchical packaging (to appear), Ph.D. thesis, Hasso Plattner Institute, 2012

    Google Scholar 

  20. Global Standards 1: EPCglobal certificate profile specification version 1.0 (2010), http://www.gs1.org/gsmp/kc/epcglobal/cert/cert_1_0-standard-20060308.pdf. Accessed 8 Mar 2012

  21. Global standards 1: EPCglobal certificate profile specification version 2.0 (2010), http://www.gs1.org/gsmp/kc/epcglobal/cert/cert_2_0-standard-20100610.pdf. Accessed 8 Mar 2012

  22. The Institute of Electrical and Electronics Engineers, Inc, Wireless LAN medium access control (MAC) and physical layer (PHY) specifications (2010), http://standards.ieee.org/getieee802/download/802.11z-2010.pdf. Accessed 8 Mar 2012

  23. Bundesamt für Sicherheit in der Informationstechnik: BSI TR-03128 EAC-PKI’n für den elektronischen Personalausweis, V. 1.1 (2010), https://www.bsi.bund.de/ContentBSI/Publikationen/TechnischeRichtlinien/tr03128/index_htm.html. Accessed 8 Mar 2012

  24. The Institute of Electrical and Electronics Engineers, Inc., EEE standard for local and metropolitan area networks: overview and architecture (2002), http://standards.ieee.org/getieee802/download/802-2001.pdf. Accessed 8 Mar 2012

  25. A. Benlian, T. Hess, P. Buxmann, Software-as-a-Service: Kunden-Anbieterstrategien (Kundenbedürfnisse und Wertschöpfungsstrukturen, Gabler, 2010)

    Book  Google Scholar 

  26. M.-P. Schapranow, M. Lorenz, A. Zeier, H. Plattner, License-based access control in EPCglobal networks, in Proceedings of 7th European Workshop on Smart Objects: Systems, Technologies and Applications, VDE, 2011

    Google Scholar 

  27. M.-P. Schapranow, ENIAC tutorial: the modulo function (2006), http://www.myhpi.de/~schapran/eniac/modulo. Accessed 8 Mar 2012

  28. M.R. Rieback, B. Crispo, A.S. Tanenbaum, The evolution of RFID security. IEEE Pervasive Comput. 5, 62–69 (2006)

    Article  Google Scholar 

  29. B.W. Lampson, Protection, in Proceedings of 5th Princeton Conference on Information Sciences and Systems (1971), pp. 437–443

    Google Scholar 

  30. European Commission, Recommendation on privacy and data protection in applications supported by radio-frequency identification (2009), http://ec.europa.eu/information_society/policy/rfid/documents/recommendationonrfid2009.pdf. Accessed 8 Mar 2012

  31. Federal Office for Information Security, BSI standard 100–3: risk analysis based on IT-Grundschutz V.2.5 (2008)

    Google Scholar 

  32. S.L. Garfinkel, A. Juels, R. Pappu, RFID privacy: an overview of problems and proposed solutions. IEEE Secur. Priv. 3, 34–43 (2005)

    Google Scholar 

  33. S. Spiekermann, Privacy enhancing technologies for RFID in retail: an empirical investigation, in Proceedings of the 9th International Conference on Ubiquitous Computing (Springer, Berlin, 2007), pp. 56–72

    Google Scholar 

  34. E. Bertino, P.A. Bonatti, E. Ferrari, TRBAC: a temporal role-based access control model. ACM Trans. Inf. Syst. Secur. 4, 191–233 (2001)

    Article  Google Scholar 

  35. M.-P. Schapranow, J. Müller, A. Zeier, H. Plattner, Security aspects in vulnerable RFID-aided supply chains, in Proceedings of 5th European Workshop on RFID Systems and Technologies, VDE, 2009

    Google Scholar 

  36. US Pharmaceuticals Pfizer Inc., Anti-counterfeit drug initiative workshop and vendor display (2006),http://www.fda.gov/OHRMS/DOCKETS/dockets/05n0510/05N-0510-EC21-Attach-1.pdf. Accessed 8 Mar 2012

  37. METRO Group, METRO group and RFID (2008), http://www.future-store.org/fsi-internet/get/documents/FSI/multimedia/pdfs/broschueren/RFID%20und%20MG-E-271108-Internet.pdf. Accessed 8 Mar 2012

  38. FoeBuD e.V. Die StopRFID-Seiten des FoeBuD e.V. (2012), http://www.foebud.org/rfid/index_html. Accessed 8 Mar 2012

  39. M. Abadi, C. Fournet, Access control based on execution history, in Proceedings of the 10th Annual Network and Distributed System Security, Symposium (2003), pp. 107–121

    Google Scholar 

  40. G. Edjlali, A. Acharya, V. Chaudhary, History-based access control for mobile code, in Proceedings of 5th Conference on Computer and Communications, Security (1998), pp. 38–48

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Matthieu -P. Schapranow .

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Schapranow, MP. (2014). Related Work. In: Real-time Security Extensions for EPCglobal Networks. In-Memory Data Management Research. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-36343-6_2

Download citation

Publish with us

Policies and ethics